General
-
Target
915_8170fa34df7d78e7b0f6e09f7b3a2dd7a0ed2fa4b79939d7ee79e4bf03aedc81.zip
-
Size
511KB
-
Sample
231114-pgssjacb8t
-
MD5
2d82f4c0cc6d6e657f64236eff3f6843
-
SHA1
ac54a470f35738aece84225c9e7d5152b5a34c5a
-
SHA256
f043c2cac52d85b0c614b2175f1574500580b787607815680022bc3cad2c021a
-
SHA512
64dc92154716d2ef027a7cbb2a8398f00232674486fe41593f125cdac61d9f3e720d9f20bcda9b911447c3e71eab2819ddfddb8b6aa1752a36468e162fc61989
-
SSDEEP
12288:SnrnvIv+nfEzoEavZRw7c0ONxME7aus3dEqw+BnNJwrEcy:Sn7vIkEfURkc011P3+NgNJwrPy
Static task
static1
Behavioral task
behavioral1
Sample
9379_13112023_Bank Transfer Copy_pdf.exe
Resource
win7-20231023-es
Behavioral task
behavioral2
Sample
9379_13112023_Bank Transfer Copy_pdf.exe
Resource
win10v2004-20231023-es
Malware Config
Extracted
azorult
http://185.29.10.12/2023/Panel/index.php
Targets
-
-
Target
9379_13112023_Bank Transfer Copy_pdf.exe
-
Size
614KB
-
MD5
08659bc44365a408b013e68d8bc8a996
-
SHA1
b9af8c172849ba0b59567a5387bd9067e6ef30d8
-
SHA256
4cb149ab8d4c479d15760084f0de97e7bbfe3abb1f70623be19835213b03ba66
-
SHA512
7905d143768d73be107b14651406211a20065c5440bbcdc14ffc7a149df718f7c157efd0109bcec9229dd9e8bdf6ac49ec9b6cae78708f080339a7e8a54c940d
-
SSDEEP
12288:cijW1/tFVzWXGINE2VGCbAJRys5jzMz9LrPWUT8d:XRJVGCbORhlELruUT8
-
Azorult
An information stealer that was first discovered in 2016, targeting browsing history and passwords.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Loads dropped DLL
-
Accesses Microsoft Outlook profiles
-
Accesses cryptocurrency files/wallets, possible credential harvesting
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious use of SetThreadContext
-